Tuesday, February 9, 2016

CIS 210 FINAL EXAM


BUY HERE


CIS 210 Final Exam
1.     When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.
2.     Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.
3.     Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.
4.     A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
5.     Microsoft’s ____ is one of the major Web-based development environments.
6.     A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.
7.     In a(n) ____ approach, the systems analyst defines the overall objectives of a system and then breaks them down into subsystems and modules.
8.     In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.
9.     In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.
10.   In a structure chart, a curved arrow represents a ____, which indicates that one or more modules are repeated.
11.   ____ measures a module’s scope and processing characteristics.
12.   A module that performs a single function or task has a high degree of ____, which is desirable.
13.   Many database programs generate ____, which is a language that allows PC client workstations to communicate with servers and mainframe computers.
14.   The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.
15.   In a file-oriented information system, a security file ____.
16.   Any field that is not a primary key or a candidate key is called a ____ key.
17.   A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.
18.   A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.
19.   When a primary key combines two or more fields, it is called any of the following EXCEPT a ____ key.
20.   A ____ report is a type of detail report in which a control break causes specific actions, such as printing subtotals for a group of records.
21.   ____ describes the relationship between computers and the people who use them to perform business-related tasks.
22.   Interface designers can obtain data, called ____ metrics, by using software that can record and measure user interaction with a system.
23.   Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.
24.   A(n) ____ produces one or more lines of output for each record processed.
25.   Printed output is used in ____ documents, which are output documents that are later entered back into the same or another information system.
26.   The ____ is a control feature at the top of a data entry screen that displays the main menu options.
27.   A ____ resembles a circle of computers that communicate with each other.
28.   When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.
29.   In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a(n) ____.
30.   ____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
31.   A disadvantage of a bus network is that ____.
32.   ____ describes how data actually moves from an application on one computer to an application on another networked computer.
33.   In all cases, a network must use a ____, which is a set of standards that govern network data transmission.
34.   If significant changes take place in an existing system or if a new version is released, the IT department might develop a ____.
35.   Adaptive maintenance ____.
36.   Perfective maintenance ____.
37.   Perfective maintenance usually is cost effective ____ the system’s operational life.
38.   The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
39.   In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.
40.   ____ expenses vary significantly during a system’s operational life and include spending to support maintenance activities.











                     

No comments:

Post a Comment